nobaloney
NoBaloney Internet Svcs - In Memoriam †
One of my clients, running RHEL 3, has installed a cert in the user section of the admin login, to be used as a shared cert.
He's installed the CA chain cert as well.
Now here's the weirdness:
On my Windows 2000 system, using IE 5.5, the cert appears as good; and the Certification Path shows the GTE Cyber Trust Root.
On the same system, using NS 7.1, the cert appears as good, and the Details shows the GTE Cyber Trust Root.
But on my RHL 9 Linux desktop system, using Mozilla 1.2.1, and Konkueror 3.1-12, the cert doesn't appear as good, and the details show no root certificate.
The client, using Windows and IE 6 also shows the cert as NOT good, and with no root certificate.
The address of the site is:
https://www.fdserve.com/
Will you please try it for me and tell me if the cert appeared as good, or if you get an error telling you it's from an untrusted certification authority.
I'll appreciate a bunch of tests so we can get an idea of what to say when we talk with Comodo Monday morning.
EDIT:
Edited 12:54 am Sunday Morning, July 4, 2004:
I've done a bit more testing and I found an interesting anomaly.
Server-wide certs installed with DA under the admin user panel end up in different locations:
The cert ends up in the /etc/httpd/conf/ssl.cert directory.
The private key ends up in the /etc/httpd/conf/ssl.key directory.
And the CACert ends up in the /usr/local/directadmin/data/users/admin/domains directory.
The ones in the /etc/httpd/conf.ssl.key and /etc/httpd/conf/ssl.crt directories are owned by root:root, and the permissions are rw for root, and no permissions for any other users.
The ones in the /usr/local/directadmin/data/users/admin/domains directory are owned by directadmin:directadmin and the permissions are rw for directadmin and no permissions for any other users.
I'm guessing this works because https connections are always handled by the main httpd daemon, which is run as root.
But it's a bit weird.
Any ideas, anyone?
END-EDIT
Thanks!
Jeff
He's installed the CA chain cert as well.
Now here's the weirdness:
On my Windows 2000 system, using IE 5.5, the cert appears as good; and the Certification Path shows the GTE Cyber Trust Root.
On the same system, using NS 7.1, the cert appears as good, and the Details shows the GTE Cyber Trust Root.
But on my RHL 9 Linux desktop system, using Mozilla 1.2.1, and Konkueror 3.1-12, the cert doesn't appear as good, and the details show no root certificate.
The client, using Windows and IE 6 also shows the cert as NOT good, and with no root certificate.
The address of the site is:
https://www.fdserve.com/
Will you please try it for me and tell me if the cert appeared as good, or if you get an error telling you it's from an untrusted certification authority.
I'll appreciate a bunch of tests so we can get an idea of what to say when we talk with Comodo Monday morning.
EDIT:
Edited 12:54 am Sunday Morning, July 4, 2004:
I've done a bit more testing and I found an interesting anomaly.
Server-wide certs installed with DA under the admin user panel end up in different locations:
The cert ends up in the /etc/httpd/conf/ssl.cert directory.
The private key ends up in the /etc/httpd/conf/ssl.key directory.
And the CACert ends up in the /usr/local/directadmin/data/users/admin/domains directory.
The ones in the /etc/httpd/conf.ssl.key and /etc/httpd/conf/ssl.crt directories are owned by root:root, and the permissions are rw for root, and no permissions for any other users.
The ones in the /usr/local/directadmin/data/users/admin/domains directory are owned by directadmin:directadmin and the permissions are rw for directadmin and no permissions for any other users.
I'm guessing this works because https connections are always handled by the main httpd daemon, which is run as root.
But it's a bit weird.
Any ideas, anyone?
END-EDIT
Thanks!
Jeff
Last edited: